from the sexist,-moi? dept

It's fairly widely accepted that the key digital device in the future will be the mobile phone, not the desktop computer that has had such an impact on Western society for the last few decades. That's partly a question of cost -- if devices are to reach even the poorest in emerging economies, they must be very cheap. But there are also other factors, such as the mobile phone's small size and portability; its rugged design and ability to cope with intermittent power supplies; and the built-in Net connectivity that more or less comes as standard.

But not everyone is delighted at the prospect of this powerful technology becoming pervasive. Here, for instance, is a depressing tale from India:

A village council in the state of Bihar this week prohibited unmarried women and girls from using mobile phones, saying that they promote extramarital affairs and unsanctioned marriages and erode the moral fabric of society. Married women will be allowed to use them only indoors and in the presence of a relative.

Well, perhaps mobile phones have indeed contributed to affairs, but logic dictates that there was probably a man at the other end of the conversation, and it's quite likely he was using a mobile phone too: why not ban all unmarried men and boys from using them, and only allow married ones to make calls under supervision of their relatives? The answer, of course, is that this is not about "eroding the moral fabric of society", but about power, and in particular the erosion of traditional male power in the village:

Many villagers, male and female, attended a village meeting Sunday about the ban, and most favored it, particularly older people, Mr. Alam said. He presided over the meeting. The panchayat [unelected council], which is made up entirely of men, also barred women from bathing outdoors, at water pumps or in ponds or canals.

Moreover:

The village's top elected official, Shamina Khatoon, a woman, was not invited to the panchayat’s meeting on Sunday.

Which is pretty strange, since she is both the top official in the village and a woman, and so might be expected to offer a useful perspective on the proposal.

Other comments from the New York Times article indicate that Indian officials are investigating the matter, which at least offers some hope that the ban will be rescinded. Whatever happens, this incident confirms that one of the best ways of empowering women and weakening the grip of patriarchal power is to help them acquire them mobiles cheaply. Moore's Law and mobile companies eager to sell phones and contracts to anyone, whatever their gender, will make sure that happens whether the village elders like it or not.

from the butterfly-effect dept

Last year, we wrote about how companies in China were creating really innovative mobile phones and devices, in large part because they were ignoring intellectual property laws, and could mix and match the best of everything out there. I didn't quite know what was behind the scenes as the "guts" of such phones, but Fast Company has a fascinating story, about how the massive revolution in cheap Chinese knockoff mobile phones is a result of a Taiwanese firm called MediaTek, coming out with a "mobile-phone-in-a-box" single chipset that anyone could use to make mobile phones. Buy the chipsets, build a case around it, throw on some software, and you've got a phone. What's interesting is the suggestion that this device may have eventually contributed to the Arab Spring.

Basically, the quick version of the story is that the MediaTek chipsets made it easy for "shanzai" to become massive mobile phone makers and sellers overnight. They would take the chipset, knock off features from other phones, or add a few features themselves, and, voila, a phone. As one person quoted in the article notes, you used to need a giant company to build a mobile phone. "But now, a company with five guys can do it." In fact, these firms would make small batches of all different kinds of phones to see how the market reacted. Talk about rapid prototyping and rapid innovation based on direct customer feedback...

However, with MediaTek not supporting more modern 3G mobile networks, it faced growth limits in China, and moved on to India and eventually to the Middle East, where cheap Chinese knockoff phones apparently became quite popular. The story does appear to be missing any direct evidence that the phones were used in the Arab protests, but does point to reports about such phones flooding into the region in the months before. There's certainly a correlation there, though that doesn't mean a causal relationship by any means. Either way, though, it is a fascinating story about how such a "gray market" came into being and changed markets over time.

from the time-to-stop-using-your-blackberry dept

A couple years ago, the Indian government started demanding that RIM give them a backdoor to read encrypted Blackberry email messages. At the time, RIM insisted that was technically impossible due to end-user encryption (something that's been called into question due to RIM's agreements with other countries, such as Saudi Arabia). A few months after that exchange, India announced that it didn't matter any more because it had cracked the encryption, and could spy on messages at will.

The telecom department has rejected the interception solution offered by Canada's (RIM) for its secure corporate email service. What's more is that it has spurned RIM's technical solution for decoding all chat communication on the popular BlackBerry Messenger service...

In an internal note, dated September 28, reviewed by ET, the telecom department's security wing claims security agencies have been unable to intercept or monitor secure email communication made through the (BES) in readable format. "RIM maintains that it does not have the keys that can be offered to security agencies for converting secure corporate email into readable format," said a senior DoT official with direct knowledge of the matter. The DoT internal note claims law enforcement agencies have failed to intercept chats on the BlackBerry Messenger platform, which runs counters to the home ministry's recent position that it is satisfied with the interception solution offered by RIM.

Reading between the lines, it sounds like RIM is still sticking to the fact that, thanks to end-user encryption, it simply can't reveal the message contents -- but it sounds like it agreed to offer access to other information, which the Indian government feels is not enough. Of course, for all of India's rather public admission that it wants to spy on all sorts of communications, it doesn't seem to recognize that it's scaring companies away from doing business in India, as the threat of having communications spied upon is too big a risk.

from the land-of-confusion dept

Earlier in the week, I posted that a new cheap laptop initiative from the Indian government was following the OLPC project's strategy of forging ahead on its own, instead of collaborating with market players and taking advantage of the benefits such collaboration could offer. Some more details about the project have emerged, and I'm glad to report they weren't doing what I predicted, in that they didn't launch a new student-focused netbook; instead, they launched... well, this thing that isn't a laptop. The problem is it's not very clear at all what, exactly, the device is. The Times of India calls it "a damp squib," and a storage device that could lead to the development of a $60 laptop. Photos aren't a lot of help, nor is the description that it "helps e-learners access the Web easily." Even the most detailed list of specs doesn't help. As far as we can tell, it's some sort of glorified 2GB thumb drive, in a 10-inch by 5-inch case, that may or may not include some networking technology. It's somehow related to a project to put textbook information online so it can more easily be accessed in remote parts of the country. So, congrats to the Indian government for not going down the laptop path, but if they could better explain just what they hell they have made, everybody would be grateful.

from the would-you-like-to-extend-your-size-to-160-characters? dept

The problem of spam text messages sent to mobile phones has been a significant one in many countries, though it hasn't reached epidemic proportions (yet) in the US. Operators have done a pretty good job of stopping the messages from getting delivered, while the cost and difficulty of sending them has also been a useful obstacle. Some, however, still manage to get through. Over in India, the government has extended its do not call list to cover commercial text messages as well, and has mandated that operators must add some tracking information to the messages so regulators can track down their senders. In the US, it's illegal for telemarketers to call cell phones, while the not-particularly-effective CAN-SPAM act makes it illegal to send spam email to phones. At least one court has ruled that SMS spam is covered by the law banning telemarketing calls to mobiles, but it would be nice to see cell phones get some extra protection from spam -- especially since it often brings some financial pain as well as annoyance.

from the blame-the-technology dept

Perhaps it's no surprise that, following the terrorist attacks in Mumbai, people are freaking out and blaming technology, as if that will prevent another terrorist attack. First, there were the calls to ban Google maps and now a large number of police are sweeping through all of Mumbai to find open WiFi networks and get the owners to shut the networks down. Of course, there are plenty of perfectly legitimate reasons for offering an open WiFi network, but it seems that no one is even considering that. Because such networks were used in the past by terrorists and possibly could be again, they all must go.

from the details-missing dept

Earlier this year, India demanded that RIM allow it to easily snoop on any email messages sent via Blackberry devices. The company explained that since the end user sets the encryption key, there's simply no way to provide a backdoor to snoop on the messages. However, now the government is proudly claiming that it's cracked the code and can now monitor Blackberry messages on various mobile operator networks. The details are quite vague, especially an offhand comment about how this is "wholly for non-enterprise solutions." That would suggest, then, that enterprise Blackberry messages may remain secure. It also raises questions about whether or not the mobile operators in question are simply providing access to their mail servers. Either way, the whole thing seems weird -- including the government's effort to publicize the fact that it's spying on Blackberry messages.

from the overreact-much? dept

In most of the discussions we've had over the years concerning the legalities of open WiFi networks, the issue was whether or not it was legal to access an open WiFi network. Over in India, they're taking a different approach, apparently preparing rules that would outlaw offering an open WiFi network (via Slashdot). This is in response to the recent bombings in India, where officials believe the bombers used open WiFi networks to email each other. That seems like a pretty big overreaction. If it's not open WiFi, the terrorists will come up with other ways to communicate -- and in the meantime you inconvenience everyone else, and make it impossible for those who want to offer open WiFi to do so.

from the so-sorry dept

A few months back, we noted that the Indian government was demanding that RIM let government officials snoop on emails sent via Blackberry devices, or they would be banned in India. I'm not sure why it took so long for RIM to point this out, but it finally has explained to the government the nature of its encryption scheme which means that RIM itself cannot decrypt messages sent via the network, since they're based on an encryption key set up by the end user. It's not clear how India is going to respond, though the article notes the two sides are "talking."

from the let-us-eavesdrop-or-no-more-crackberry dept

It's certainly no secret that governments like to snoop on various forms of communication whenever possible, but they're usually not quite so blatant about the specifics. Endgadget points us to the news that Indian security officials have demanded that RIM open up a backdoor to unencrypt all messages sent via the Blackberry network or face being shutdown in India. With approximately 400,000 Crackberry users in India, that's likely to upset quite a few people. At this point, though, do people doing things likely to attract the attention of the feds not know to seek out more secure means of communication?